mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
added exce rule
This commit is contained in:
parent
bf33052469
commit
498e2267c3
@ -198,7 +198,7 @@ Path Publisher
|
|||||||
Where `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the **Publisher** name and `WORDPAD.EXE` is the **File** name.
|
Where `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the **Publisher** name and `WORDPAD.EXE` is the **File** name.
|
||||||
|
|
||||||
### Import a list of apps
|
### Import a list of apps
|
||||||
For this example, we’re going to add an AppLocker XML file to the **Protected apps** list. You’ll use this option if you want to add multiple apps at the same time. For more info about AppLocker, see the [AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/applocker-overview) content.
|
For this example, we’re going to add an AppLocker XML file to the **Protected apps** list. You’ll use this option if you want to add multiple apps at the same time. The first example shows how to create a Packaged App rule for Store apps. The second example shows how to create an Executable rule by using a path for unsigned apps. For more info about AppLocker, see the [AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/applocker-overview) content.
|
||||||
|
|
||||||
**To create a list of protected apps using the AppLocker tool**
|
**To create a list of protected apps using the AppLocker tool**
|
||||||
1. Open the Local Security Policy snap-in (SecPol.msc).
|
1. Open the Local Security Policy snap-in (SecPol.msc).
|
||||||
@ -273,6 +273,39 @@ For this example, we’re going to add an AppLocker XML file to the **Protected
|
|||||||
|
|
||||||
12. After you’ve created your XML file, you need to import it by using Microsoft Intune.
|
12. After you’ve created your XML file, you need to import it by using Microsoft Intune.
|
||||||
|
|
||||||
|
**To create an Executable rule and xml file for unsigned apps**
|
||||||
|
1. Open the Local Security Policy snap-in (SecPol.msc).
|
||||||
|
|
||||||
|
2. In the left pane, click **Application Control Policies** > **AppLocker** > **Executable Rules**.
|
||||||
|
|
||||||
|
3. Right-click **Executable Rules** > **Create New Rule**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. On the **Before You Begin** page, click **Next**.
|
||||||
|
|
||||||
|
5. On the **Permissions** page, make sure the **Action** is set to **Allow** and the **User or group** is set to **Everyone**, and then click **Next**.
|
||||||
|
|
||||||
|
6. On the **Conditions** page, click **Path** and then click **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
7. Click **Browse Folders...** and select the path for the unsigned apps. For this example, we’re using "C:\Program Files".
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
8. On the **Exceptions** page, add any exceptions and then click **Next**.
|
||||||
|
|
||||||
|
9. On the **Name** page, type a name and description for the rule and then click **Create**.
|
||||||
|
|
||||||
|
10. In the left pane, right-click **AppLocker** > **Export policy**.
|
||||||
|
|
||||||
|
11. In the **Export policy** box, browse to where the policy should be stored, give the policy a name, and then click **Save**.
|
||||||
|
|
||||||
|
The policy is saved and you’ll see a message that says 1 rule was exported from the policy.
|
||||||
|
|
||||||
|
12. After you’ve created your XML file, you need to import it by using Microsoft Intune.
|
||||||
|
|
||||||
**To import a list of protected apps using Microsoft Intune**
|
**To import a list of protected apps using Microsoft Intune**
|
||||||
|
|
||||||
1. In **Protected apps**, click **Import apps**.
|
1. In **Protected apps**, click **Import apps**.
|
||||||
|
@ -193,7 +193,7 @@ In this example, you'd get the following info:
|
|||||||
Where the text, `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the publisher name to enter in the **Publisher Name** box.
|
Where the text, `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the publisher name to enter in the **Publisher Name** box.
|
||||||
|
|
||||||
### Add an AppLocker policy file
|
### Add an AppLocker policy file
|
||||||
Now we’re going to add an AppLocker XML file to the **App Rules** list. You’ll use this option if you want to add multiple apps at the same time. The first example shows how to create a Packaged App rule for Store apps. The second example shows how to create an Executable rule by using a path for unsigned apps. For more info, see [AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/applocker-overview).
|
Now we’re going to add an AppLocker XML file to the **App Rules** list. You’ll use this option if you want to add multiple apps at the same time. For more info, see [AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/applocker-overview).
|
||||||
|
|
||||||
**To create a Packaged App rule rule and xml file**
|
**To create a Packaged App rule rule and xml file**
|
||||||
1. Open the Local Security Policy snap-in (SecPol.msc).
|
1. Open the Local Security Policy snap-in (SecPol.msc).
|
||||||
@ -260,39 +260,6 @@ Now we’re going to add an AppLocker XML file to the **App Rules** list. You’
|
|||||||
```
|
```
|
||||||
12. After you’ve created your XML file, you need to import it by using Microsoft Intune.
|
12. After you’ve created your XML file, you need to import it by using Microsoft Intune.
|
||||||
|
|
||||||
**To create an Executable rule and xml file for unsigned apps**
|
|
||||||
1. Open the Local Security Policy snap-in (SecPol.msc).
|
|
||||||
|
|
||||||
2. In the left pane, click **Application Control Policies** > **AppLocker** > **Executable Rules**.
|
|
||||||
|
|
||||||
3. Right-click **Executable Rules** > **Create New Rule**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. On the **Before You Begin** page, click **Next**.
|
|
||||||
|
|
||||||
5. On the **Permissions** page, make sure the **Action** is set to **Allow** and the **User or group** is set to **Everyone**, and then click **Next**.
|
|
||||||
|
|
||||||
6. On the **Conditions** page, click **Path** and then click **Next**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
7. Click **Browse Folders...** and select the path for the unsigned apps. For this example, we’re using "C:\Program Files".
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
8. On the **Exceptions** page, add any exceptions and then click **Next**.
|
|
||||||
|
|
||||||
9. On the **Name** page, type a name and description for the rule and then click **Create**.
|
|
||||||
|
|
||||||
10. In the left pane, right-click **AppLocker** > **Export policy**.
|
|
||||||
|
|
||||||
11. In the **Export policy** box, browse to where the policy should be stored, give the policy a name, and then click **Save**.
|
|
||||||
|
|
||||||
The policy is saved and you’ll see a message that says 1 rule was exported from the policy.
|
|
||||||
|
|
||||||
12. After you’ve created your XML file, you need to import it by using Microsoft Intune.
|
|
||||||
|
|
||||||
**To import your Applocker policy file app rule using Microsoft Intune**
|
**To import your Applocker policy file app rule using Microsoft Intune**
|
||||||
1. From the **App Rules** area, click **Add**.
|
1. From the **App Rules** area, click **Add**.
|
||||||
|
|
||||||
|
Binary file not shown.
Before Width: | Height: | Size: 28 KiB After Width: | Height: | Size: 35 KiB |
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Introduction to Windows Defender Device Guard - virtualization-based security and code integrity policies (Windows 10)
|
title: Windows Defender Device Guard - virtualization-based security and code integrity policies (Windows 10)
|
||||||
description: Microsoft Windows Defender Device Guard is a feature set that consists of both hardware and software system integrity hardening features that revolutionize the Windows operating system’s security.
|
description: Microsoft Windows Defender Device Guard is a feature set that consists of both hardware and software system integrity hardening features that revolutionize the Windows operating system’s security.
|
||||||
keywords: virtualization, security, malware
|
keywords: virtualization, security, malware
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -9,7 +9,7 @@ author: mdsakibMSFT
|
|||||||
ms.date: 04/19/2018
|
ms.date: 04/19/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control
|
# Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
Loading…
x
Reference in New Issue
Block a user